From e0dbfc15784cb8d2506315bc0dd8c954566acfe8 Mon Sep 17 00:00:00 2001 From: BillyNoGoat <49021076+BillyNoGoat@users.noreply.github.com> Date: Tue, 16 Apr 2019 11:37:59 +0100 Subject: [PATCH] Fixed link for google CSP bypass --- XSS Injection/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/XSS Injection/README.md b/XSS Injection/README.md index 79d825b..c4f9aba 100644 --- a/XSS Injection/README.md +++ b/XSS Injection/README.md @@ -779,7 +779,7 @@ Exotic payloads ## CSP Bypass -Check the CSP on [https://csp-evaluator.withgoogle.com](https://csp-evaluator.withgoogle.com) and the post : [How to use Google’s CSP Evaluator to bypass CSP](https://blog.thomasorlita.cz/vulns/google-csp-evaluator/) +Check the CSP on [https://csp-evaluator.withgoogle.com](https://csp-evaluator.withgoogle.com) and the post : [How to use Google’s CSP Evaluator to bypass CSP](https://appio.dev/vulns/google-csp-evaluator/) ### Bypass CSP using JSONP from Google (Trick by [@apfeifer27](https://twitter.com/apfeifer27))